Has the Stuxnet worm ushered in a new era of cyberwar, or is it simply the latest iteration of familiar strategic instruments? Has the Internet irrevocably shifted the balance between individuals and states, or will governments adapt to regain the upper hand? Does the real threat to cybersystems lie within cyberspace, or in the real world? Cyberwar has become a permanent feature of the strategic landscape, but we might hardly know it.
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.
Warfare and conflict are no longer just about the clash of uniformed armies and their cutting-edge technology. Conflict in the Information Age is about ideas, values, aspirations, fears and the struggle of people for identity. How will humankind define and wage war in the Infosphere? This book is about a journey into a new place that we have yet to define. It is offered by thinkers in the forefront of American and British government, academic, military, and private industry. Here are some of the issues examined:
• Is Infowar real?
• Who will defend cyberspace?
• What are Information Operations?
• Can and should the military patrol the information highway?
• What are the legal, ethical and moral issues?
• Will information decrease or add to the fog of war?
•Can we safely outsource national security?
• What did Kosovo teach us?
• How would Sun Tzu have employed information war?
• How real is the Insider Threat?
• What is the psychology of future war?
• Will technology be master or servant?
• Can perceptions be managed in peace, crisis and war?
• Who should protect critical infrastructures and how?
• What is the information content in National Security Strategy?
The challenge in combating terrorism is not that any of us could die tomorrow in an attack, but that we cannot seem to perform the basic functions of diagnosing and treating the problem so that it is manageable. Given this, and because public and private sector partnerships are critical to the success of this management, Homeland Security and Private Sector Business: Corporations’ Role in Critical Infrastructure Protection identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats.
Organized to take into consideration differing leadership and management styles, organizational cultural change barriers, and team dynamics, the information is structured to appeal to most adult learning styles, ensuring effective communication of critical messages. Using helpful case studies and exercises, the author presents invaluable instruction on how to establish, implement, and reinforce terrorism awareness and regulatory compliance with national critical infrastructure interests. Comprehensive in scope, the book reviews threat factors, risk mitigation, readiness plans, prevention approaches, human factors, and training methods. It concludes with insights into the limitations businesses must respect as they adjust to this new paradigm.
A recognized expert in terrorism deterrence and counterintelligence methods, Elsa Lee brings her 28 years of experience in counterterrorism, counterintelligence, and counterespionage investigations to inform the discussion. Organizations which integrate her recommendations into their internal corporate strategies will not only contribute to Homeland Security efforts, but will also ultimately improve business continuity, resiliency, and operational and financial security for the corporation.